- Regent UniversityLaw, 1996 - 1999
- Northwestern State UniversityPolitical Science & History, 1993
- Scheef & Stone, L.L.P.Partner, 2014 - present
- BrittonTumaPartner, 2011 - 2014
- Winstead2000 - 2007
- Shamoun & Norman2007 - 2009
- Winstead PC
2600 Network Blvd., Suite 400 Frisco, Texas 75034
Marriott Customers’ Personal Details Exposed by Simple Web Flaw
From Tripwire's State of Security Blog: Marriott Customers’ Personal Details Exposed by Simple Web Flaw Here’s a piece of advice for anyone
Boards Not Regularly Briefed on Cyber-Security: Survey | SecurityWeek.Com
Boards of directors may have authority over the business, but they may be among the last to know about the security risks facing their organ
Cyber crime is a threat to global economy, says researcher
Halting cyber crime could have a positive impact on the global economy, says Halting cyber crime could have a positive impact on the global
5 questions to ask before a breach happens | CSO Online
Use these five questions to start the conversations necessary to 'assume breach' and plan ahead.
Forum selection clause in browsewrap agreement did not bind parties in b...
internet technology intellectual property attorney Evan Brown Chicago lawyer copyright trademark domain names UDRP DMCA data privacy
Law firms face cybersecurity audits by banking clients; are they a 'weak...
Banks are increasingly scrutinizing their law firms’ cybersecurity efforts, including the law firms’ protection of confidential information
2 Questions to See if Your Company is at Risk of a Data Breach
2 Simple Questions to Determine if Your Business is at Risk of Data Breach. 1. Does your business have digital information about others that
Perfect memory, enhanced vision, an expert golf swing: The future of bra...
How soon can we expect to see brain implants for perfect memory, enhanced vision, hypernormal focus or an expert golf swing? We're closer th
Top 10 Developments/Headlines in Trade Secret, Computer Fraud, and Non-C...
Trading Secrets A Law Blog on Trade Secrets, Non-Competes, and Computer Fraud. Home · About · Contact · Resources · Webinars · Podcasts · Up